Preview

1. Introduction Distribution Supported Pricing & Design Registration

Better Essays
Open Document
Open Document
1965 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
1. Introduction Distribution Supported Pricing & Design Registration
1. Introduction Distribution Supported Pricing & Design Registration
Most Semiconductor Manufactures choose 2 channels to sell their products. Direct where Value, Quantities or Strategic reasons Manufacturers uses its own sales operations. Remaining customers supported indirectly through distributors, setting distribution bye price to allow the distributor to make margin. Manufactures allow Distributor to apply for Volume or Strategic pricing and getting further discount called supported pricing. Some Products require “Technical Sales and Support” while being "designed in", to encourage and cover additional costs incurred a further distribution price reduction is offered, allowing additional profit from the work. To monitor, and administrate this process a supported price / design registration scheme is set up.
2. The Registration Process.
The Process required the Applications / Sales Engineer to complete paper a registration form: Figure 1 Registration Form
Once a Customer has been visited the form is completed and sent in to the distributor’s office, by fax or post. There a Franchise Manager who has responsibility for controlling and processing the application, checks the form and forwards to the Franchise’s Sales person, who then check the form and if accepted issues the supported pricing or design registration the process is outline in the registration flow diagram below.
There were 2 sets of records, the distributors and the franchise. The Distributor records are duplicated as the FEA Sales and the franchise Manager kept a copy.

Figure 2 Design Registration Flow Diagram
3. Issues with the Registration Process.
1. Updating, synchronisation and access to the records are difficult
2. Customer Identification correct Name Address, Multi Site, with an account, or with out, New customers, Previous account Activity, Competitions activity (Business aligned with other Distributors), Buying Location different to Engineering Location, Use of sub



References: (1) Sekiguchi T 2007 “A contingency perspective of the importance of PJ Fit and PO fit in employee Selection” Journal of management Psychology 118 -131. (2) Porter, M.E. (1979) How Competitive Forces Shape Strategy, Harvard business Review, March/April 1979. (3) Porter, M.E. (1980) Competitive Strategy, Free Press, New York, 1980. (4) Bocij, P., Greasley, A., Hickie, S. (2008) ‘Business Information Systems:Technology, Development & Management, 4nd Edition, FT/ Prentice Hall, (5) European Network and Information Security Agency, United Kingdom Country Report 2010. (6) European Network and Information Security Agency, A users Guide: How to raise Information Security Awareness (7) Centre for the protection of National Infrastructure: Sources of Guidance on Security in the Telecommunications sector

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    bis 221 wk 4

    • 632 Words
    • 3 Pages

    Ranier, R.K. & Cegielski, C.G. (2011). Introduction to information systems: Supporting and transforming business (3rd Ed.) Hoboken, NJ: John Wiley & Sons.…

    • 632 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Meltdown at Jetblue

    • 394 Words
    • 2 Pages

    References: Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (2nd ed.). Hoboken, NJ: Wiley.…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Rainer, R. K. & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    2511 M W15 MD 01 02 14

    • 3673 Words
    • 16 Pages

    Rainer, Cegielski, Splettstoesser-Hogeterp and Sánchez-Rodríguez. 2013. Introduction to Information Systems: Supporting and Transforming Business, Third Canadian Edition, John Wiley & Sons, Inc.…

    • 3673 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Cis207 Syllabus

    • 2232 Words
    • 9 Pages

    Rainer, R. K., Jr., & Cegielski, C. G. (2012). Introduction to information systems: Supporting and transforming business (4th ed.). Hoboken, NJ: John Wiley & Sons.…

    • 2232 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Rainer, R. K., & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 1661 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    References: Rainer, R. K., Jr., & Cegielski, C. G. (2012). Introduction to information systems: Supporting and transforming business (4th ed.). Hoboken, NJ: John Wiley & Sons.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    www.itu.int/ITU-T/studygroups/com17/ict/part05.htmlJun 6, 2011 – The following work on best practices has so far been identified for inclusion in this section ... European Network and Information Security Agency ... 800-12 An Introduction to Computer Security: The NIST Handbook · 800-100 ...…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Bibliography: Baltzan, P., & Phillips, A. (2009). Information system in business, system driven information systems (pg. 22, 23, 24, 89). McGraw-Hill.…

    • 5074 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    100. Follow these General Instructions and the Requirement and Instruction for each Item in franchise…

    • 22833 Words
    • 92 Pages
    Powerful Essays
  • Powerful Essays

    Levis Research

    • 8552 Words
    • 35 Pages

    The franchisee sells directly to the customers and the distributers sell to the sub-franchisee and the sub-franchisees sell to the customers.…

    • 8552 Words
    • 35 Pages
    Powerful Essays
  • Good Essays

    This report presents the major findings of the research project Kasi – Future Information Security Trends (Kasi – tulevaisuuden tietoturvatrendit) conducted by Helsinki Institute for Information Technology HIIT and VTT Technical Research Centre of Finland. The project is a part of Tekes Safety and Security Research Program (Tekesin Turvallisuus-ohjelma) and its purpose is to provide rigorous and systematic foreseeing knowledge for the implementation of the Finnish National Information Security Strategy (kansallinen tietoturvastrategia). The aim of the project was to study near-future information security issues that are related to, for example, new technologies, services, and business models. Our approach combines perspectives from different disciplines in order to better address the complexity of the focus area. We identified relevant future information security trends especially from the Finnish viewpoint in the next five to ten years by collecting and analysing specialists’ conceptions and knowledge of the various developments in their professional fields. In order to deepen the analysis, we also specified factors and attributes that affect the realization of the trends. In addition, our objective was to evaluate the need for establishing a separate program for continuous foreseeing activities and provide methodological and procedural guidelines for carrying it out. Our research process went through five separate steps: 1) outlining possible future environments, 2) creating concrete future scenarios or stories, 3) analyzing information security issues in the…

    • 17037 Words
    • 69 Pages
    Good Essays